-
1
-
-
34547251000
-
Performance Analysis of IEEE 802.15.4 and ZigBee for Large-Scale Wireless Sensor Network Applications
-
ACM
-
Mikko Kohvakka, Mauri Kuorilehto "Performance Analysis of IEEE 802.15.4 and ZigBee for Large-Scale Wireless Sensor Network Applications" PE-WASUN'06, ACM, Vol: 487, PP: 48-57, 2006.
-
(2006)
PE-WASUN'06
, vol.487
, pp. 48-57
-
-
Kohvakka, M.1
Kuorilehto, M.2
-
3
-
-
84869438107
-
A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks
-
Salem M., Sarhan A., Abu-Bakr M.. "A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks", ICGSTCNIR, Volume 7, No.1, 2007.
-
(2007)
ICGSTCNIR
, vol.7
, Issue.1
-
-
Salem, M.1
Sarhan, A.2
Abu-Bakr, M.3
-
4
-
-
51349091564
-
On the Performance of IEEE 802.11 under Jamming
-
Bayraktaroglu E., King C., Liu X., Noubir G.,Rajaraman R., Thapa B., "On the Performance of IEEE 802.11 under Jamming" Proceedings of IEEE 27th Conference on Computer Communications (INFOCOM'08), Phoenix, Arizona, USA. pp:67-74, 2008.
-
(2008)
Proceedings of IEEE 27th Conference on Computer Communications (INFOCOM'08), Phoenix, Arizona, USA
, pp. 67-74
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
6
-
-
84874384931
-
Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network
-
DOI: 10.1016
-
C.Balarengadurai, S Saraswathi. "Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network" in proceedings of Elsevier Procedia Engineering, Vol:38, pp:3855-3863, DOI: 10.1016,2012.
-
(2012)
Proceedings of Elsevier Procedia Engineering
, vol.38
, pp. 3855-3863
-
-
Balarengadurai, C.1
Saraswathi, S.2
-
7
-
-
80054858261
-
Different types of attacks in integrate MANET internet communication
-
Abhay kumar Rai, Rajiv Ranjan "Different types of attacks in integrate MANET internet communication", IJCSS, Vol: 4, PP: 265-274, 2010.
-
(2010)
IJCSS
, vol.4
, pp. 265-274
-
-
Rai, A.K.1
Ranjan, R.2
-
8
-
-
77952147526
-
Fuzzy Logic-based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks
-
Zubair A. Baig, Salman A. Khan "Fuzzy Logic-based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks" in IEEE conference on Future Networks, PP:185-190,2010
-
(2010)
IEEE Conference on Future Networks
, pp. 185-190
-
-
Baig, Z.A.1
Khan, S.A.2
-
9
-
-
78549251230
-
A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks
-
Z. A. Baig and A. I. Khan, "A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks," Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects, pp. 277290, 2008.
-
(2008)
Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects
, pp. 277290
-
-
Baig, Z.A.1
Khan, A.I.2
-
12
-
-
2642584004
-
Denial-of-service attacks on battery powered mobile computers
-
T. Martin, M. Hsiao "Denial-of-service attacks on battery powered mobile computers," in Second IEEE Annual Conference on Pervasive Computing and Communications., Orlando, FL, 2004.
-
Second IEEE Annual Conference on Pervasive Computing and Communications., Orlando, FL, 2004
-
-
Martin, T.1
Hsiao, M.2
-
13
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
M. Brownfield, G. Yatharth, et al., "Wireless sensor network denial of sleep attack," in the Sixth Annual IEEE Systems, Man and Cybernetics(SMC) Information Assurance Workshop. West Point, NY, PP: 234-256, 2009
-
(2009)
Sixth Annual IEEE Systems, Man and Cybernetics(SMC) Information Assurance Workshop. West Point, NY
, pp. 234-256
-
-
Brownfield, M.1
Yatharth, G.2
-
14
-
-
27544469503
-
A study on fuzzy intrusion detection
-
Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security
-
J. T. Yao, S. L. Zhao, L. V. Saxton, "A study on fuzzy intrusion detection", In Proc. of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, pp: 23-30, 2005.
-
(2005)
Proc. of SPIE
, vol.5812
, pp. 23-30
-
-
Yao, J.T.1
Zhao, S.L.2
Saxton, L.V.3
-
15
-
-
33845947480
-
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection
-
A. El-Semary, J. Edmonds, J. Gonzalez-Pino, M. Papa, "Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection", In Proc. of IEEE Information Assurance Workshop, pp: 100-107, 2006.
-
(2006)
Proc. of IEEE Information Assurance Workshop
, pp. 100-107
-
-
El-Semary, A.1
Edmonds, J.2
Gonzalez-Pino, J.3
Papa, M.4
-
16
-
-
69249213464
-
Network forensics based on fuzzy logic and expert system
-
N. Liao, S. Tiana, T. Wanga, "Network forensics based on fuzzy logic and expert system", Computer Communications, Vol. 32, no. 17, pp. 1881-1892, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1881-1892
-
-
Liao, N.1
Tiana, S.2
Wanga, T.3
-
17
-
-
78549240053
-
An Approach to a New Network Security architecture for Academic Environments
-
M. Mohajerani, A. Moeini, "An Approach to a New Network Security architecture for Academic Environments". Lecture Notes in Computer Science, Volume 2434, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2434
-
-
Mohajerani, M.1
Moeini, A.2
-
18
-
-
70350778315
-
Threat Modeling Using Fuzzy Logic Paradigm
-
A. Sodiya, S. Onashoga, B. Oladunjoye, "Threat Modeling Using Fuzzy Logic Paradigm" Issues in Informing Science and Information Technology Volume 4, pp. 53-61, 2007.
-
(2007)
Issues in Informing Science and Information Technology
, vol.4
, pp. 53-61
-
-
Sodiya, A.1
Onashoga, S.2
Oladunjoye, B.3
-
19
-
-
78549247632
-
Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report injection by Replaying an attack
-
J. H. Kim, T. H. Cho, "Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report injection by Replaying an attack", International Journal of Computer Science and Network Security, Vol. 9, no.7, pp. 91-96, 2009,
-
(2009)
International Journal of Computer Science and Network Security
, vol.9
, Issue.7
, pp. 91-96
-
-
Kim, J.H.1
Cho, T.H.2
-
23
-
-
0032667848
-
Minimum energy mobile wireless networks
-
Aug
-
V. Rodoplu, and T. Meng. "Minimum energy mobile wireless networks," IEEE J. S elected Areas in Communications, vol. 17, no. 8, pp. 1333-3344, Aug 2008.
-
(2008)
IEEE J. S Elected Areas in Communications
, vol.17
, Issue.8
, pp. 1333-3344
-
-
Rodoplu, V.1
Meng, T.2
-
24
-
-
78549288531
-
On the Use of Unified And-Or Fuzzy Operator for Distributed Node Exhaustion Attack Decision-making in Wireless Sensor Networks
-
Salman A. Khan, Zubair A. Baig, "On the Use of Unified And-Or Fuzzy Operator for Distributed Node Exhaustion Attack Decision-making in Wireless Sensor Networks" IEEE Transaction on Fuzzy systems,PP: 978-987,2010.
-
(2010)
IEEE Transaction on Fuzzy Systems
, pp. 978-987
-
-
Khan, S.A.1
Baig, Z.A.2
-
25
-
-
79951737949
-
A Triangle module operator and Fuzzy Logic Based Han doff Algorithm for Heterogeneous Wireless Network
-
ISBN: 9784-4244-6868-3
-
Sheng Jie Tang Liangrui "A Triangle module operator and Fuzzy Logic Based Han doff Algorithm for Heterogeneous Wireless Network"12th IEEE International Conference on Communication Technology, ISBN: 9784-4244-6868-3, pp: 448-451, 2011.
-
(2011)
12th IEEE International Conference on Communication Technology
, pp. 448-451
-
-
Jie, S.1
Liangrui, T.2
-
26
-
-
84868268469
-
A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area Network
-
Springer Verlag, DOI: 10.1007/978-3-642-32063-7-43
-
C.Balarengadurai, S Saraswathi, "A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area Network" in proceedings of Advances in Intelligent Systems and Computing-Springer Verlag, Vol: 182, pp: 405-416, DOI: 10.1007/978-3-642-32063- 7-43, 2012.
-
(2012)
Proceedings of Advances in Intelligent Systems and Computing
, vol.182
, pp. 405-416
-
-
Balarengadurai, C.1
Saraswathi, S.2
-
27
-
-
77951710463
-
Information Warfare-Worthy Jamming Attack DetectionMechanism for Wireless Sensor Networks Using a Fuzzy Inference System
-
doi:10.3390/s100403444
-
Sudip Misra, Ranjit Singh, S. V. Rohith Mohan "Information Warfare-Worthy Jamming Attack DetectionMechanism for Wireless Sensor Networks Using a Fuzzy Inference System" Sensors open aceess Vol:10, pp.3444-3479; doi:10.3390/s100403444, 2010.
-
(2010)
Sensors Open Aceess
, vol.10
, pp. 3444-3479
-
-
Misra, S.1
Singh, R.2
Rohith Mohan, S.V.3
-
29
-
-
84874377617
-
A Fuzzy based Detection Technique for Jamming Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network
-
Springer Verlag-LNEE
-
C.Balarengadurai, S Saraswathi, "A Fuzzy based Detection Technique for Jamming Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network" in proceedings of Advances in Intelligent Systems and Computing-Springer Verlag-LNEE, pp: 422-433,2012.
-
(2012)
Proceedings of Advances in Intelligent Systems and Computing
, pp. 422-433
-
-
Balarengadurai, C.1
Saraswathi, S.2
|